10.12.2012 Views

Prime Numbers

Prime Numbers

Prime Numbers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 8<br />

THE UBIQUITY OF PRIME NUMBERS<br />

It is often remarked that prime numbers finally found a legitimate practical<br />

application in the domain of cryptography. The cryptographic relevance is not<br />

disputed, but there are many other applications of the majestic primes. Some<br />

applications are industrial—such as applications in numerical analysis, applied<br />

mathematics, and other applied sciences—while some are of the “conceptual<br />

feedback” variety, in which primes and their surrounding concepts are used<br />

in theoretical work outside of, say, pure number theory. In this lucrative<br />

research mode, primes are used within algorithms that might appear a priori<br />

independent of primes, and so on. It seems fair to regard the prime number<br />

concept as ubiquitous, since the primes appear in so very many disparate<br />

domains of thought.<br />

8.1 Cryptography<br />

On the face of it, the prime numbers apply to cryptography by virtue of the<br />

extreme difficulty of certain computations. Two such problems are factoring<br />

and the discrete logarithm problem. We shall discuss practical instances of<br />

these problems in the field of cryptography, and also discuss elliptic curve<br />

generalizations.<br />

8.1.1 Diffie–Hellman key exchange<br />

In a monumental paper [Diffie and Hellman 1976], those authors observed<br />

the following “one-way function” behavior of certain group operations. For a<br />

given integer x ≥ 0 and an element g of F ∗ p, the computation of<br />

h = g x<br />

in the field (so, involving continual (mod p) reductions) is generally of<br />

complexity O(ln x) field operations. On the other hand, solving this equation<br />

for x, assuming g, h, p given, is evidently very much harder. As x is an<br />

exponent, and since we are taking something like a logarithm in this<br />

latter problem, the extraction of the unknown x is known as the discrete<br />

logarithm (DL) problem. Though the forward (exponentiation) direction is of<br />

polynomial-time complexity, no general method is known for obtaining the<br />

DL with anything like that efficiency. Some DL algorithms are discussed in<br />

Chapter 5 and in [Schirokauer et al. 1996].

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!